Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Class coalescence for obfuscation of object-oriented software

a technology of object-oriented software and coalescence, applied in the direction of program control, unauthorized memory use protection, instruments, etc., can solve the problems of software tampering with malicious intent, such as planting a trojan horse in the end user's system, being very undesirable, and being particularly susceptible to piracy and other forms of malicious condu

Inactive Publication Date: 2006-12-12
PANASONIC CORP
View PDF11 Cites 117 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0009]FIG. 1 is a flow chart diagram which is useful for describing an exemplary embodiment of the present invention.
[0010]FIG. 2 is another flow chart diagram which is useful for describing an exemplary embodiment of the present invention.
[0011]FIG. 3 is yet another flow chart diagram which is useful for describing an exemplary embodiment of the present invention.

Problems solved by technology

Furthermore, software tampering with malicious intent, for example, planting a Trojan horse in the end user's system, is a very undesirable possibility.
As such, object-oriented programs and applications are especially susceptible to piracy and other forms of malicious conduct.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Class coalescence for obfuscation of object-oriented software
  • Class coalescence for obfuscation of object-oriented software
  • Class coalescence for obfuscation of object-oriented software

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015]In an exemplary embodiment, the present invention relates to an obfuscation technique for programs written in an object-oriented language based on combining (coalescing) classes in a way that preserves the functional behavior of the program. In such an embodiment, if several classes are coalesced, the number of classes used by the program is reduced. The resulting obfuscation breaks abstractions represented by the coalesced classes, thereby making reverse engineering of the program more difficult. In some situations, it should be noted that class coalescence by itself may not provide sufficient obfuscation to prevent re-engineering and / or tampering. As such, it is anticipated that class coalescence may be used in conjunction with other obfuscation techniques such as variable renaming and splitting, to produce powerful and efficient obfuscation transformations.

[0016]Although the present application concentrates heavily on coalescing classes in Java programs, the invention is ap...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method of obfuscating an object-oriented program is provided. A program is provided that is defined in terms of a plurality of classes. Each of the classes has at least one of a field and a method. At least two of the plurality of classes are combined into a combined class. When the at least two classes are combined, at least one field from at least one of the two classes is included in the combined class, and / or at least one method from at least one of the two classes is included in the combined class. After the at least two classes are combined, the program is transmitted.

Description

FIELD OF THE INVENTION[0001]The present invention relates generally to the obfuscation of software programs, and more particularly to the obfuscation of object-oriented programs through class coalescence.BACKGROUND OF THE INVENTION[0002]Through the numerous distribution mechanisms, software is increasingly distributed as original source code or in forms that can be easily converted to source code. For example, generally, Java bytecodes may be converted into source code. Often, such codes may be easily de-compiled, and as such, malicious parties may be able to steal any associated intellectual property with relative ease. Furthermore, software tampering with malicious intent, for example, planting a Trojan horse in the end user's system, is a very undesirable possibility.[0003]Thus, it would be desirable to have efficient and effective mechanisms for protecting software and associated intellectual property. In some applications, dedicated hardware with integrated decryption and execu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(United States)
IPC IPC(8): G06F9/44G06F21/00
CPCG06F9/4433G06F21/14G06F9/4492
Inventor NAUMOVICH, GLEBYALCIN, EZGIMEMON, NASIR D.YU, HONG HEATHERSOSONKIN, MIKHAIL
Owner PANASONIC CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products